-
1
-
-
0003914522
-
-
(CMU/SEI-99/TR-028). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
-
Allen, J., Christie, A., Fithin, W., McHugh, J., Pickel, J., and E. Stoner, "State of the Practice of Intrusion Detection Technologies." (CMU/SEI-99/TR-028). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2000.
-
(2000)
State of the Practice of Intrusion Detection Technologies
-
-
Allen, J.1
Christie, A.2
Fithin, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
3
-
-
0003964874
-
-
Technical report, SRI International, Computer Science Lab
-
Anderson, D.; Frivold, T.; and A. Valdes, "Next-generation Intrusion Detection Expert System (NIDES)", Technical report, SRI-CSL-95-07, SRI International, Computer Science Lab, 1995.
-
(1995)
Next-generation Intrusion Detection Expert System (NIDES)
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
4
-
-
33745293149
-
The Use of Information Retrieval Techniques for Intrusion Detection
-
Louvain-la-Neuve, Belgium
-
Anderson, R. and A. Khattak, "The Use of Information Retrieval Techniques for Intrusion Detection", Proceedings of RAID, Louvain-la-Neuve, Belgium, 1998.
-
(1998)
Proceedings of RAID
-
-
Anderson, R.1
Khattak, A.2
-
7
-
-
3943082567
-
-
Technical report, CUCS
-
Apap, F., A. Honig, S. Hershkop, E. Eskin, and S. Stolfo. "Detecting malicious software by monitoring anomalous windows registry accesses." Technical report, CUCS, 2001.
-
(2001)
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
8
-
-
0003699055
-
-
Technical Report, Department of Computer Sciences, Purdue University
-
Autonomous Agents. Technical Report CSD-TR-95-022, Department of Computer Sciences, Purdue University, 1995.
-
(1995)
Autonomous Agents
-
-
-
10
-
-
0003907293
-
-
Macmillan Tech. Pub. Indianapolis, IN
-
Bace, Rebecca, "Intrusion Detection." Macmillan Tech. Pub. Indianapolis, IN, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
12
-
-
84955580290
-
An Architecture for Intrusion Detection Using Autonomous Agents
-
Purdue University, W. Lafayette, IN
-
Balasubramaniyan, J.S., J. O. Garcia-Fernandez, D. Isacoff, E.H. Spafford, and D. Zamboni. "An Architecture for Intrusion Detection Using Autonomous Agents." COAST technical report 98/05, Purdue University, W. Lafayette, IN, 1998.
-
(1998)
COAST Technical Report
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.H.4
Zamboni, D.5
-
18
-
-
3943073609
-
-
Master thesis, Division of Computer Science, University of California, Davis, CA, March
-
Brentano, J. "An Expert System for Detecting Attacks on Distributed Computer Systems." Master thesis, Division of Computer Science, University of California, Davis, CA, March 1991.
-
(1991)
An Expert System for Detecting Attacks on Distributed Computer Systems
-
-
Brentano, J.1
-
20
-
-
0041189148
-
RETISS: A Real Time Security System for Threat Detection Using Fuzzy Logic
-
Taipei, Taiwan
-
Carrettoni, F., S. Castano, G. Martella, and P. Samarati. "RETISS: A Real Time Security System for Threat Detection Using Fuzzy Logic." Proceedings of the Twenty-Fifth Annual IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan, 1991.
-
(1991)
Proceedings of the Twenty-Fifth Annual IEEE International Carnahan Conference on Security Technology
-
-
Carrettoni, F.1
Castano, S.2
Martella, G.3
Samarati, P.4
-
21
-
-
3943105967
-
-
Lodovic Me, SUPELEC, France
-
Cedex, CS. Genetic Algorithms, an Alternative Tool for Security Audit Trails Analysis. Lodovic Me, SUPELEC, France, 1993.
-
(1993)
Genetic Algorithms, An Alternative Tool for Security Audit Trails Analysis
-
-
Cedex, CS,1
-
22
-
-
0004204717
-
-
University of California, Davis, Computer Science Department technical report
-
Cheung, S., R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, J. Rowe, S. Staniford-Chen, R. Yip, and D. Zerkle. "The Design of GrIDS: A Graph-Based Intrusion Detection System." University of California, Davis, Computer Science Department technical report CSE-99-2, 1999.
-
(1999)
The Design of GrIDS: A Graph-Based Intrusion Detection System
-
-
Cheung, S.1
Crawford, R.2
Dilger, M.3
Frank, J.4
Hoagland, J.5
Levitt, K.6
Rowe, J.7
Staniford-Chen, S.8
Yip, R.9
Zerkle, D.10
-
23
-
-
0013294745
-
Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection
-
Cumbria, U.K.
-
Cheung, S. and K. N. Levitt. "Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection." Proceedings New Security Paradigms Workshop, Cumbria, U.K., 1997.
-
(1997)
Proceedings New Security Paradigms Workshop
-
-
Cheung, S.1
Levitt, K.N.2
-
28
-
-
3943104599
-
Recent Advances in Intrusion Detection
-
Toulouse, France. Springer Verlag
-
Debar, H., M. Ludovic, and S. Felix Wu (eds.), "Recent Advances in Intrusion Detection," Third International Workshop, Raid 2000, Toulouse, France. Springer Verlag, 2000.
-
(2000)
Third International Workshop, Raid 2000
-
-
Debar, H.1
Ludovic, M.2
Wu, S.F.3
-
29
-
-
3943081852
-
-
Technical report, Columbia University, CUCS
-
DeDios, P., R. El-Khalil, K. Sarantakos, M. Miller, E. Eskin, W. Lee, and S. Stolfo. "Heuristic audit of network traffic: A data mining-based approach to network intrusion detection." Technical report, Columbia University, CUCS, 2001.
-
(2001)
Heuristic Audit of Network Traffic: A Data Mining-based Approach to Network Intrusion Detection
-
-
DeDios, P.1
El-Khalil, R.2
Sarantakos, K.3
Miller, M.4
Eskin, E.5
Lee, W.6
Stolfo, S.7
-
33
-
-
0012056837
-
-
Computer Science Laboratory, SRI International
-
Denning, D., D. Edwards, R. Jagannathan, T. Lunt, P. Neumann. "A Prototype IDES: A Real-Time Intrusion Detection Expert System." Computer Science Laboratory, SRI International, 1987.
-
(1987)
A Prototype IDES: A Real-Time Intrusion Detection Expert System
-
-
Denning, D.1
Edwards, D.2
Jagannathan, R.3
Lunt, T.4
Neumann, P.5
-
34
-
-
3943110072
-
Modeling Attacks on Computer Systems: Evaluating Vulnerabilities and Forming a Basis for Attack Detection
-
Menlo Park, CA
-
Dias, G., K.N. Levitt, and B. Mukherjee. "Modeling Attacks on Computer Systems: Evaluating Vulnerabilities and Forming a Basis for Attack Detection." SRI Intrusion Detection Workshop, Menlo Park, CA, 1990.
-
(1990)
SRI Intrusion Detection Workshop
-
-
Dias, G.1
Levitt, K.N.2
Mukherjee, B.3
-
35
-
-
0031234827
-
IDAMN: An Intrusion Detection Architecture for Mobile Networks
-
Didier, S., and R. Molva, "IDAMN: An Intrusion Detection Architecture for Mobile Networks", IEEE Journal on Selected Areas in Communications, 15, 7, 1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.7
-
-
Didier, S.1
Molva, R.2
-
36
-
-
0242409064
-
-
Master thesis, University of California, Davis, CA
-
Doak, J., "Intrusion Detection: The Application of Feature Selection, a Comparison of Algorithms, and the Application of a Network Analyzer." Master thesis, University of California, Davis, CA, 1992.
-
(1992)
Intrusion Detection: The Application of Feature Selection, A Comparison of Algorithms, and the Application of A Network Analyzer
-
-
Doak, J.1
-
41
-
-
0009900351
-
Anomaly detection over noisy data using learned probability distributions
-
Menlo Park, CA
-
Eskin, E. "Anomaly detection over noisy data using learned probability distributions." In Proceedings of ICML 2000, Menlo Park, CA, 2000.
-
(2000)
Proceedings of ICML 2000
-
-
Eskin, E.1
-
42
-
-
0344439823
-
-
Technical report, CUCS
-
Eskin, E., A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo. "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data." Technical report, CUCS, 2002.
-
(2002)
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
44
-
-
84964540406
-
Modeling system calls for intrusion detection with dynamic window sizes
-
Anaheim, CA
-
Eskin, E., W. Lee, and S. Stolfo. Modeling system calls for intrusion detection with dynamic window sizes. In Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX II), Anaheim, CA, 2001.
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX II)
-
-
Eskin, E.1
Lee, W.2
Stolfo, S.3
-
46
-
-
31844454074
-
A Multiple Model Cost-Sensitive Approach for Intrusion Detection
-
Fan, W., Lee, W.; Stolfo, S. and M. Miller, "A Multiple Model Cost-Sensitive Approach for Intrusion Detection" Eleventh European Conference on Machine Learning, 2000.
-
(2000)
Eleventh European Conference on Machine Learning
-
-
Fan, W.1
Lee, W.2
Stolfo, S.3
Miller, M.4
-
47
-
-
3943083935
-
Intrusion Detection Intercomponent Adaptive Negotiation
-
W. Lafayette, IN
-
Feiertag, R., L. Benzinger, S. Rho, and S. Wu. "Intrusion Detection Intercomponent Adaptive Negotiation." Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection, W. Lafayette, IN, 1999.
-
(1999)
Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection
-
-
Feiertag, R.1
Benzinger, L.2
Rho, S.3
Wu, S.4
-
48
-
-
3943053209
-
Intrusion Detection Systems
-
Forte, D. "Intrusion Detection Systems" login: 24, 1, 1999.
-
(1999)
Login
, vol.24
, Issue.1
-
-
Forte, D.1
-
50
-
-
3943104600
-
Planning, Petri Nets, and Intrusion Detection
-
Crystal City, VA
-
Frincke, D., D. Tobin, and Y. Ho. "Planning, Petri Nets, and Intrusion Detection." Proceedings of Twenty-First National Information System Security Conference, Crystal City, VA, 1998.
-
(1998)
Proceedings of Twenty-First National Information System Security Conference
-
-
Frincke, D.1
Tobin, D.2
Ho, Y.3
-
53
-
-
0344871638
-
FAQ: Network Intrusion Detection Systems
-
Robert Graham
-
Graham, R., "FAQ: Network Intrusion Detection Systems," InfoWorld, Robert Graham. 1998-2000.
-
(1998)
InfoWorld
-
-
Graham, R.1
-
54
-
-
0345302827
-
-
Ph.D. thesis, University of California, San Diego, Department of Computer Sciences, San Diego, CA
-
Gross, A., "Analyzing Computer Intrusions." Ph.D. thesis, University of California, San Diego, Department of Computer Sciences, San Diego, CA, 1997.
-
(1997)
Analyzing Computer Intrusions
-
-
Gross, A.1
-
55
-
-
3943109378
-
-
Research report, Universitaires Notre Dame de la Paix, Namur, Belgium
-
Habra, N., B. Le Charlier, and A. Mounji. "Advanced Security Audit Trail Analysis on UNIX: Implementation Design of the NADF Evaluator." Research report, Universitaires Notre Dame de la Paix, Namur, Belgium, 1993.
-
(1993)
Advanced Security Audit Trail Analysis on UNIX: Implementation Design of the NADF Evaluator
-
-
Habra, N.1
Le Charlier, B.2
Mounji, A.3
-
56
-
-
3943060682
-
-
Universitaires Notre Dame de la Paix, Namur, Belgium, Research report
-
Habra, N., B. Le Charlier, and A. Mounji. "Preliminary Report on Advanced Security Audit Trail Analysis on UNIX." Universitaires Notre Dame de la Paix, Namur, Belgium, Research report, 1991.
-
(1991)
Preliminary Report on Advanced Security Audit Trail Analysis on UNIX
-
-
Habra, N.1
Le Charlier, B.2
Mounji, A.3
-
59
-
-
0003478316
-
-
Technical report Department of Computer Science, University of New Mexico, Albuquerque, NM
-
Heady, R., G. Luger, A.B. Maccabe, and M. Servilla. "The Architecture of a Network Level Intrusion Detection System." Technical report CS90-20, Department of Computer Science, University of New Mexico, Albuquerque, NM, 1990.
-
(1990)
The Architecture of A Network Level Intrusion Detection System
-
-
Heady, R.1
Luger, G.2
Maccabe, A.B.3
Servilla, M.4
-
61
-
-
0024984013
-
A Network Security Monitor
-
Heberlein, L., G. Dias, K. Levitt, B. Mukherjee, J. Wood and D. Wolber. "A Network Security Monitor." Proceedings of the IEEE Symposium on Research in Security and Privacy, 1990.
-
(1990)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Heberlein, L.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
66
-
-
84894798958
-
Foundations of Intrusion Detection
-
Franconia, NH
-
Helman, P., G. Liepins, and W. Richards. "Foundations of Intrusion Detection." Proceedings of the Fifth Computer Security Foundations Workshop, Franconia, NH, 1992.
-
(1992)
Proceedings of the Fifth Computer Security Foundations Workshop
-
-
Helman, P.1
Liepins, G.2
Richards, W.3
-
67
-
-
3943092394
-
-
Technical report, CUCS
-
Hershkop, S., F. Apap, E. Glanz, T. D'alberti, E. Eskin, Sal Stolfo, and J. Lee. "Hobids: A data mining approach to host based intrusion detection." Technical report, CUCS, 2001.
-
(2001)
Hobids: A Data Mining Approach to Host Based Intrusion Detection
-
-
Hershkop, S.1
Apap, F.2
Glanz, E.3
D'alberti, T.4
Eskin, E.5
Stolfo, S.6
Lee, J.7
-
68
-
-
84948704634
-
What is behavior-based intrusion detection?
-
IBM Zurich Research Laboratory. SANS Institute Resources
-
Herve, D. "What is behavior-based intrusion detection?" IBM Zurich Research Laboratory. SANS Institute Resources, Intrusion Detection FAQ, 2000.
-
(2000)
Intrusion Detection FAQ
-
-
Herve, D.1
-
69
-
-
0027593257
-
NADIR: An Automated System for Detecting Network Intrusion and Misuse
-
Hochberg, J., K. Jackson, C. Stallings, J.F. McClary, D. DuBois, and J. Ford. "NADIR: An Automated System for Detecting Network Intrusion and Misuse." Computers and Security 12, 3, 235-248, 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.3
, pp. 235-248
-
-
Hochberg, J.1
Jackson, K.2
Stallings, C.3
McClary, J.F.4
DuBois, D.5
Ford, J.6
-
70
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyer, S.A., S. Forrest, and A. Somayaji. "Intrusion detection using sequences of system calls," Journal of Computer Security, 6:151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyer, S.A.1
Forrest, S.2
Somayaji, A.3
-
71
-
-
0344235646
-
-
Trusted Information Systems, Inc. TIS Report
-
Hubbard, B., T. Haley, N. McAuliffe, L. Schaefer, N. Kelem, D. Wolcon, R. Feiertag and M. Schaefer. Computer System Intrusion Detection. Trusted Information Systems, Inc. TIS Report No.348, 1990
-
(1990)
Computer System Intrusion Detection
-
-
Hubbard, B.1
Haley, T.2
McAuliffe, N.3
Schaefer, L.4
Kelem, N.5
Wolcon, D.6
Feiertag, R.7
Schaefer, M.8
-
73
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection Approach
-
Ilgun, K., R.A. Kemmerer, and P. Porras. "State Transition Analysis: A Rule-Based Intrusion Detection Approach." IEEE Transactions on Software Engineering 21, 3, 181-199, 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.3
-
74
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun, K., R.A. Kemmerer, and P.A. Porras. "State transition analysis: A rule-based intrusion detection approach." IEEE Transactions on Software Engineering, 21, 3, 181-199,1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
76
-
-
0344871633
-
-
Published by Distributed Knowledge Systems Team; Computer Research and Applications Group; Computing, Information and Communications Division; Los Alamos National Laboratory, Los Alamos, New Mexico
-
Jackson, K. A., "Intrusion Detection System (IDS) Product Survey". Published by Distributed Knowledge Systems Team; Computer Research and Applications Group; Computing, Information and Communications Division; Los Alamos National Laboratory, Los Alamos, New Mexico, 1999.
-
(1999)
Intrusion Detection System (IDS) Product Survey
-
-
Jackson, K.A.1
-
79
-
-
3943080487
-
An Automated Computer Misuse Detection System for UNICOS
-
Tours, France
-
Jackson, K., M.C. Neumann, D. Simmonds, C. Stallings, J. Thompson, and G. Christoph. "An Automated Computer Misuse Detection System for UNICOS." Proceedings of the Cray Users Group Conference, Tours, France, 1994.
-
(1994)
Proceedings of the Cray Users Group Conference
-
-
Jackson, K.1
Neumann, M.C.2
Simmonds, D.3
Stallings, C.4
Thompson, J.5
Christoph, G.6
-
81
-
-
84893511281
-
Tripwire: A Case Study in Integrity Monitoring
-
edited by Dorothy and Peter Denning, Addison-Wesley
-
Kim, G. and E. H. Spafford. "Tripwire: A Case Study in Integrity Monitoring." Internet Besieged: Countering Cyberspace Scofflaws, edited by Dorothy and Peter Denning, Addison-Wesley, 1997.
-
(1997)
Internet Besieged: Countering Cyberspace Scofflaws
-
-
Kim, G.1
Spafford, E.H.2
-
83
-
-
0343472276
-
-
(CMU/SEI-SIM- 006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
-
Kossakowski, P., "Responding to Intrusions." (CMU/SEI-SIM- 006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1999.
-
(1999)
Responding to Intrusions
-
-
Kossakowski, P.1
-
93
-
-
85084163349
-
Data Mining Approaches for Intrusion Detection
-
San Antonio, TX
-
Lee, W. and S. Stolfo, "Data Mining Approaches for Intrusion Detection" Proceedings, Seventh USENIX Security Symposium, San Antonio, TX, 1998.
-
(1998)
Proceedings, Seventh USENIX Security Symposium
-
-
Lee, W.1
Stolfo, S.2
-
95
-
-
2942608134
-
-
Columbia University Computer Science Technical Report
-
Lee, W., Miller, M., Stolfo, S. Jallad, K. Park, C. Zadok, E. and V. Prabhakar, " Toward Cost-Sensitive Modeling for Intrusion Detection" Columbia University Computer Science Technical Report CUCS-002-00, 2000.
-
(2000)
Toward Cost-Sensitive Modeling for Intrusion Detection
-
-
Lee, W.1
Miller, M.2
Stolfo, S.3
Jallad, K.4
Park, C.5
Zadok, E.6
Prabhakar, V.7
-
98
-
-
84964411176
-
Real Time Data Mining-based Intrusion Detection
-
Lee, W., S. Stolfo, P.K, Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, J. Zhang. 'Real Time Data Mining-based Intrusion Detection.' Proceedings of DISCEX II, 2001.
-
Proceedings of DISCEX II, 2001
-
-
Lee, W.1
Stolfo, S.2
Chan, P.K.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
101
-
-
0002774999
-
Learning patterns from Unix processes execution traces for intrusion detection
-
Menlo Park, CA: AAAI Press
-
Lee, W., S.J. Stolfo, and P.K. Chan. 'Learning patterns from Unix processes execution traces for intrusion detection." Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, 50-56. Menlo Park, CA: AAAI Press, 1997.
-
(1997)
Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
-
104
-
-
0000524153
-
Intrusion Detection: Its Role and Validation
-
Oxford, UK: Elsevier Science Publishers, Ltd.
-
Liepins, G. and H.S. Vaccaro. "Intrusion Detection: Its Role and Validation." Computers and Security, 11, Oxford, UK: Elsevier Science Publishers, Ltd., 347-355, 1992.
-
(1992)
Computers and Security
, vol.11
, pp. 347-355
-
-
Liepins, G.1
Vaccaro, H.S.2
-
106
-
-
0034301517
-
The 1999 DARPA Off-Line Intrusion Detection Evaluation
-
Lippmann, R., J.W. Haines, D.J. Fried, J. Korba, K. Das. The 1999 DARPA Off-Line Intrusion Detection Evaluation. Computer Networks, 34, 579-595, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
107
-
-
84962260018
-
Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation
-
Lippmann, R.; Fried, D.; Graf, I.; Haines, J.; Kendall, K.; McClung, D.; Weber, D.; Webster, S.; Wyschogrod, D.; Cunninghan, R.; and M. Zissman, " Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proceedings DARPA Information Survivability Conference, 2000.
-
(2000)
Proceedings DARPA Information Survivability Conference
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunninghan, R.10
Zissman, M.11
-
111
-
-
0027609384
-
A survey of intrusion detection techniques
-
Lunt, T. "A survey of intrusion detection techniques." Computers and Security, 12, 405-418, 1993.
-
(1993)
Computers and Security
, vol.12
, pp. 405-418
-
-
Lunt, T.1
-
114
-
-
3943093755
-
Real-Time Intrusion Detection
-
San Francisco, CA
-
Lunt, T., "Real-Time Intrusion Detection." Proceedings of COMPCON Spring '89, San Francisco, CA, 1989.
-
(1989)
Proceedings of COMPCON Spring '89
-
-
Lunt, T.1
-
116
-
-
0003451777
-
-
Computer Science Laboratory, SRI International, Menlo Park, California
-
Lunt, T., Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes, and T. Garvey. "A real-time intrusion detection expert system (IDES) - final technical report." Computer Science Laboratory, SRI International, Menlo Park, California, 1992.
-
(1992)
A Real-time Intrusion Detection Expert System (IDES) - Final Technical Report
-
-
Lunt, T.1
Tamaru, F.G.2
Jagannathan, R.3
Neumann, P.4
Javitz, H.5
Valdes, A.6
Garvey, T.7
-
120
-
-
29844441257
-
A Data Mining Analysis of RTID Alarms
-
W. Lafayette, IN
-
Mandanaris, S., M. Christensen, D. Zerkle, and K. Hermis. "A Data Mining Analysis of RTID Alarms." Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection, W. Lafayette, IN, 1999.
-
(1999)
Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection
-
-
Mandanaris, S.1
Christensen, M.2
Zerkle, D.3
Hermis, K.4
-
121
-
-
0003275561
-
Towards Trapping Wily Intruders in the Large
-
W. Lafayette, IN
-
Mansfield, G. K. Ohta, Y. Takei, N. Kato, and Y. Nemoto. "Towards Trapping Wily Intruders in the Large." Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection, W. Lafayette, IN, 1999.
-
(1999)
Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection
-
-
Mansfield1
Ohta, G.K.2
Takei, Y.3
Kato, N.4
Nemoto, Y.5
-
124
-
-
3943053207
-
Intrusion Detection
-
Software Engineering Institute. Carnegie Mellon University
-
Mark, G. "Intrusion Detection," Software Technology Review, Software Engineering Institute. Carnegie Mellon University, 2000.
-
(2000)
Software Technology Review
-
-
Mark, G.1
-
125
-
-
33646029915
-
Is Your Computer Being Misused? A Survey of Current Intrusion Detection Technology
-
Tucson, AZ
-
McAuliffe, N., D. Wolcott, L. Schaefer, N. Kelem, B. Hubbard, and T. Haley. "Is Your Computer Being Misused? A Survey of Current Intrusion Detection Technology." Proceedings of the Sixth Annual Computer Security Applications Conference, Tucson, AZ, 1990.
-
(1990)
Proceedings of the Sixth Annual Computer Security Applications Conference
-
-
McAuliffe, N.1
Wolcott, D.2
Schaefer, L.3
Kelem, N.4
Hubbard, B.5
Haley, T.6
-
126
-
-
3943060681
-
A Framework for Cooperative Intrusion Detection
-
Crystal City, VA
-
McConnell, J., D.A. Frincke, D. Tobin, J. Marconi, and D. Polla. "A Framework for Cooperative Intrusion Detection." Proceedings of Twenty-First National Information System Security Conference, Crystal City, VA, 1998.
-
(1998)
Proceedings of Twenty-First National Information System Security Conference
-
-
McConnell, J.1
Frincke, D.A.2
Tobin, D.3
Marconi, J.4
Polla, D.5
-
127
-
-
27244453070
-
GASSATA, a Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis
-
Louvain-la-Neuve, Belgium
-
Me' L. "GASSATA, a Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis." First International Workshop on the Recent Advances in Intrusion Detection, Louvain-la-Neuve, Belgium, 1998.
-
(1998)
First International Workshop on the Recent Advances in Intrusion Detection
-
-
Me, L.1
-
128
-
-
3943097846
-
Security Audit Trail Analysis Using Genetic Algorithms
-
Poznan, Poland
-
Me, Ludovic. "Security Audit Trail Analysis Using Genetic Algorithms." Proceedings of the Twelfth International Conference on Computer Safety, Reliability, and Security, Poznan, Poland, 1993.
-
(1993)
Proceedings of the Twelfth International Conference on Computer Safety, Reliability, and Security
-
-
Me, L.1
-
134
-
-
0028430224
-
Network Intrusion Detection
-
Mukherjee, B.; Heberlein, L. T. and K.N Levitt. "Network Intrusion Detection," IEEE Network, 8, 3, 26-41, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
135
-
-
85095970245
-
Experience with EMERALD to Date
-
Santa Clara, California
-
Neumann, P. G., and P. A. Porras "Experience with EMERALD to Date", SRI International, 1st USENIX Workshop on Intrusion Detection and Network Monitoring. Santa Clara, California, 73-80, 1999.
-
(1999)
SRI International, 1st USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 73-80
-
-
Neumann, P.G.1
Porras, P.A.2
-
137
-
-
3943112127
-
What is Network Based Intrusion Detection?
-
SANS Institute. SANS Institute Resources, Hyperlink: ID FAQ
-
Northcutt, S., "What is Network Based Intrusion Detection?" SANS Institute. SANS Institute Resources, Intrusion Detection FAQ, Hyperlink: ID FAQ, 2000.
-
(2000)
Intrusion Detection FAQ
-
-
Northcutt, S.1
-
139
-
-
0344871636
-
What the Hackers Know about You
-
SANS Institute. SANS Institute Resources, Hyperlink: ID FAQ
-
Northcutt, S. "What the Hackers Know about You." SANS Institute. SANS Institute Resources, Intrusion Detection FAQ, Hyperlink: ID FAQ, 1999.
-
(1999)
Intrusion Detection FAQ
-
-
Northcutt, S.1
-
140
-
-
33845486066
-
SNMS - Shadow Network Management System
-
W. Lafayette, IN
-
Ong, T.H., C.P. Tan, Y.T. Tan, C.K. Chew, and C. Ting. "SNMS - Shadow Network Management System." Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection, W. Lafayette, IN, 1999.
-
(1999)
Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection
-
-
Ong, T.H.1
Tan, C.P.2
Tan, Y.T.3
Chew, C.K.4
Ting, C.5
-
141
-
-
3943098506
-
Intrusion Detection Systems
-
May
-
Panagiotis, A. "Intrusion Detection Systems". Daemon News. May 1999.
-
(1999)
Daemon News
-
-
Panagiotis, A.1
-
145
-
-
3943072915
-
-
CIAC-2305 R.1) Lawrence Livermore National Laboratory, Department of Energy Computer Incident Advisory Capability
-
Pichnarczyk, K.; Weeber, S.; and Feingold, R. "Unix Incident Guide: How to Detect an Intrusion." (CIAC-2305 R.1) Lawrence Livermore National Laboratory, Department of Energy Computer Incident Advisory Capability, 1994.
-
(1994)
Unix Incident Guide: How to Detect An Intrusion
-
-
Pichnarczyk, K.1
Weeber, S.2
Feingold, R.3
-
146
-
-
0004084716
-
-
Master thesis, Computer Science Department, University of California, Santa Barbara, CA
-
Porras, P. "STAT, A State Transition Analysis Tool for Intrusion Detection." Master thesis, Computer Science Department, University of California, Santa Barbara, CA, 1992.
-
(1992)
STAT, A State Transition Analysis Tool for Intrusion Detection
-
-
Porras, P.1
-
152
-
-
0001214789
-
A Methodology for Testing Intrusion Detection Systems
-
Puketza, N., K. Zhang, M. Chung, B. Mukherjee, and R.A. Olsson. "A Methodology for Testing Intrusion Detection Systems." IEEE Transactions on Software Engineering 22,10, 719-729, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
153
-
-
3643079262
-
A Software Platform for Testing Intrusion Detection Systems
-
Puketza, N., M. Chung, R.A. Olsson, and B. Mukherjee. "A Software Platform for Testing Intrusion Detection Systems" IEEE Software 14, no. 5, 43-51, 1997.
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 43-51
-
-
Puketza, N.1
Chung, M.2
Olsson, R.A.3
Mukherjee, B.4
-
154
-
-
3943113448
-
Do you have an intrusion detection response plan?
-
September 13
-
Reavis, J., "Do you have an intrusion detection response plan?" Network World Fusion, September 13, 1999.
-
(1999)
Network World Fusion
-
-
Reavis, J.1
-
155
-
-
0012977967
-
Snort - Lightweight intrusion detection for networks
-
Roesch, M. "Snort - lightweight intrusion detection for networks." Proceedings of Lisa '99, 1999.
-
(1999)
Proceedings of Lisa '99
-
-
Roesch, M.1
-
156
-
-
0031234827
-
IDAMN: An Intrusion Detection Architecture for Mobile Networks
-
Samfat, D. and R. Molva, "IDAMN: An Intrusion Detection Architecture for Mobile Networks", IEEE Journal on Selected Areas in Communications, 15, 7,1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.7
-
-
Samfat, D.1
Molva, R.2
-
157
-
-
84948701316
-
What is the role of a file integrity checker like Tripwire in intrusion detection?
-
SANS Institute Resources
-
SANS Institute Resources, "What is the role of a file integrity checker like Tripwire in intrusion detection?" SANS Institute Resources, Intrusion Detection FAQ, 2000.
-
(2000)
Intrusion Detection FAQ
-
-
SANS Institute Resources1
-
158
-
-
3943075640
-
Network intrusion-detection solutions
-
May 4, 1998. InfoWorld Corporation
-
Scambray, J.; McClure, S. and J. Broderick, "Network intrusion-detection solutions", InfoWorld, May 4, 1998. InfoWorld Corporation. 1998.
-
(1998)
InfoWorld
-
-
Scambray, J.1
McClure, S.2
Broderick, J.3
-
169
-
-
3943079819
-
Method and System for Detecting Intrusion into and Misuse of a Data Processing System
-
U.S. Patent Office, September 17
-
Smaha, S. and S. Snapp. "Method and System for Detecting Intrusion into and Misuse of a Data Processing System." US555742, U.S. Patent Office, September 17, 1996.
-
(1996)
-
-
Smaha, S.1
Snapp, S.2
-
171
-
-
3943101209
-
A System for Distributed Intrusion Detection
-
San Francisco, CA
-
Snapp, S., J. Brentano, G. Dias, T. Goan, T. Grance, T. Heberlein, C. Ho, K. Levitt, B. Mukherjee, D. Mansur, K. Pon, and S. Smaha. "A System for Distributed Intrusion Detection." Proceedings of COMPCON Spring '91, San Francisco, CA, 1991.
-
(1991)
Proceedings of COMPCON Spring '91
-
-
Snapp, S.1
Brentano, J.2
Dias, G.3
Goan, T.4
Grance, T.5
Heberlein, T.6
Ho, C.7
Levitt, K.8
Mukherjee, B.9
Mansur, D.10
Pon, K.11
Smaha, S.12
-
172
-
-
0037907453
-
The Intrusion Detection System AID: Architecture, and Experiences in Automated Audit Analysis
-
Essen, Germany
-
Sobirey, M., B. Richter, and H. Konig. "The Intrusion Detection System AID: Architecture, and Experiences in Automated Audit Analysis." Proceedings of the IFIPTC6/TC11 International Conference on Communications and Multimedia Security, Essen, Germany, 1996.
-
(1996)
Proceedings of the IFIPTC6/TC11 International Conference on Communications and Multimedia Security
-
-
Sobirey, M.1
Richter, B.2
Konig, H.3
-
174
-
-
0000949239
-
GrIDS - A Graph-Based Intrusion Detection System for Large Networks
-
Baltimore, MD
-
Staniford, S-Chen; S.Cheung; R. Crawford; M. Dilger; J. Frank, J. Hoagland; K. Levitt; C. Wee; R.Yip and D. Zerkle, "GrIDS - A Graph-Based Intrusion Detection System for Large Networks" The 19th National Information Systems Security Conference, Baltimore, MD, 1996.
-
(1996)
The 19th National Information Systems Security Conference
-
-
Staniford, S.-C.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
177
-
-
84962238645
-
Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project
-
Stolfo, S.J., W. Fan, W. Lee, A. Prodromidis, P. Chan. "Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project." Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000.
-
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000
-
-
Stolfo, S.J.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.5
-
179
-
-
0007473204
-
An Introduction to Intrusion Detection
-
Hyperlink: acm.org/Crossroads, 1996
-
Sundaram, A., "An Introduction to Intrusion Detection", Crossroads: The ACM Student Magazine,2,4,1996, Hyperlink: acm.org/Crossroads, 1996.
-
(1996)
Crossroads: The ACM Student Magazine
, vol.2
, Issue.4
-
-
Sundaram, A.1
-
180
-
-
3943066188
-
AI and 4GL: Automated Detection and Investigation and Detection Tools
-
Sydney, Australia
-
Tener, W. "AI and 4GL: Automated Detection and Investigation and Detection Tools." Proceedings of the IFIP Security Conference, Sydney, Australia, 1988.
-
(1988)
Proceedings of the IFIP Security Conference
-
-
Tener, W.1
-
181
-
-
3943078391
-
Discovery: An Expert System in the Commercial Data Security Environment
-
Monte Carlo
-
Tener, W. "Discovery: An Expert System in the Commercial Data Security Environment." Proceedings of the IFIP Security Conference, Monte Carlo, 1986.
-
(1986)
Proceedings of the IFIP Security Conference
-
-
Tener, W.1
-
182
-
-
0025548907
-
Security Audit Trail Analysis Using Inductively Generated Predictive Rules
-
IEEE Service Center, Piscataway, NJ
-
Teng, H.S., K. Chen and S. C. Lu. "Security Audit Trail Analysis Using Inductively Generated Predictive Rules." Proc. 11th National Conference on Artificial Intelligence Applications, 24-29, IEEE Service Center, Piscataway, NJ, 1990.
-
(1990)
Proc. 11th National Conference on Artificial Intelligence Applications
, pp. 24-29
-
-
Teng, H.S.1
Chen, K.2
Lu, S.C.3
-
183
-
-
0024984441
-
Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns
-
Oakland, CA
-
Teng, H.S., K. Chen, and S.C.Lu. "Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns." Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1990.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
-
-
Teng, H.S.1
Chen, K.2
Lu, S.C.3
-
184
-
-
3943099783
-
Intrusion Detection, Internet Law Enforcement, and Insurance Coverage to Accelerate the Proliferation of Internet Business
-
W. Lafayette, IN
-
Ting, Christopher, T.H. Ong, Y.T. Tan, and P.Y. Ng. "Intrusion Detection, Internet Law Enforcement, and Insurance Coverage to Accelerate the Proliferation of Internet Business." Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection, W. Lafayette, IN, 1999.
-
(1999)
Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection
-
-
Ting, C.1
Ong, T.H.2
Tan, Y.T.3
Ng, P.Y.4
-
188
-
-
84948709069
-
-
reprinted in Computer Security Journal 6,1, 89-93, 1990.
-
(1990)
Computer Security Journal
, vol.6
, Issue.1
, pp. 89-93
-
-
-
190
-
-
84948665686
-
ESSENSE: An Experiment in Knowledge-Based Security Monitoring and Control
-
Baltimore, MD
-
Valcarce, E.M., G.W. Hoglund, L. Jansen, and L. Baillie. "ESSENSE: An Experiment in Knowledge-Based Security Monitoring and Control." Proceedings of the Third USENIX Unix Security Symposium, Baltimore, MD, 1992.
-
(1992)
Proceedings of the Third USENIX Unix Security Symposium
-
-
Valcarce, E.M.1
Hoglund, G.W.2
Jansen, L.3
Baillie, L.4
-
191
-
-
0004017062
-
A Visual Mathematical Model for Intrusion Detection
-
CrystalCity, VA
-
Vert, G., D.A. Frincke, and J. McConnell. "A Visual Mathematical Model for Intrusion Detection." Proceedings of Twenty-First National Information System Security Conference, CrystalCity, VA, 1998.
-
(1998)
Proceedings of Twenty-First National Information System Security Conference
-
-
Vert, G.1
Frincke, D.A.2
McConnell, J.3
-
194
-
-
84948687244
-
-
Ph.D. thesis, University of California, Davis, CA
-
Wee, C., "Policy-Directed Auditing and Logging." Ph.D. thesis, University of California, Davis, CA, 1996.
-
(1996)
Policy-Directed Auditing and Logging
-
-
Wee, C.1
-
196
-
-
3943101208
-
-
Master thesis, University of California, Davis, CA
-
Wetmore, B. "Audit Browsing." Master thesis, University of California, Davis, CA 1993.
-
(1993)
Audit Browsing
-
-
Wetmore, B.1
-
197
-
-
0029756282
-
Cooperating Security Managers: A Peer-Based Intrusion Detection System
-
White, G., E.A. Fisch, and U.W. Pooch. "Cooperating Security Managers: A Peer-Based Intrusion Detection System." IEEE Network 10,1, 20-23, 1996.
-
(1996)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White, G.1
Fisch, E.A.2
Pooch, U.W.3
-
204
-
-
3943065527
-
Intrusion Detection for an Ongoing Attack
-
W. Lafayette, IN
-
Yuill, K., S.F. Wu, F. Gong, and M-Y. Huang, "Intrusion Detection for an Ongoing Attack." Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection, W. Lafayette, IN, 1999.
-
(1999)
Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection
-
-
Yuill, K.1
Wu, S.F.2
Gong, F.3
Huang, M.-Y.4
-
208
-
-
3943051893
-
What is host-based intrusion detection?
-
Virginia Tech CNS. Hyperlink: ID FAQ
-
Zirkle, L., "What is host-based intrusion detection?" Virginia Tech CNS. SANS Institute Resources, Intrusion Detection FAQ, Hyperlink: ID FAQ, 2000.
-
(2000)
SANS Institute Resources, Intrusion Detection FAQ
-
-
Zirkle, L.1
|